TECHNOLOGY > > Resilience


« Back to News

2025-02-03

Defending The Gig Economy Against API Attacks

GenAI is likely to be a big enabler for the gig economy. It also has the power to be hugely destructive when used maliciously. By James Sherlow

2025-01-31

Securing Critical Infrastructure From Nation-State Threats  

Q&A: Why more must be done to protect the vulnerable operational technology underpinning essential areas like energy, water & transport.  

2025-01-30

Ransomware Readiness: Transforming Threat Into Organizational Resilience

Boards that fail to prepare risk exposing their organisations to avoidable crises and losing the trust of their stakeholders. By James Eason

2025-01-29

Immutable Backup: Have The Last Word Against Ransomware

Data Security: The impact of ransomware is business critical & standard approaches to data security are no longer the answer. By Judy Kaldenberg

2025-01-28

Proven Strategies For Building Resilience In Data Backup & Recovery

Backup & recovery is essential for business continuity, resilience and regulatory compliance, as well as customer confidence. By Jakob Østergaard

2025-01-27

Cyber Security - Trending In 2025

Staying engaged with the world of cyber security is essential and in 2025 it’s crucial to keep switched on to the evolving threat landscape. 

2025-01-21

How SASE Fits Into The Modern Cybersecurity Landscape

Attackers Are Faster, Smarter & Relentless: Phishing emails, ransomware and sophisticated attacks are the norm. Enter SASE.

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-08

Which Cybersecurity Trends Will Dominate 2025?

Organisations need to brace for a wave of threats driven by advanced technologies and increasingly sophisticated attack vectors. By Paul McLatchie

2025-01-09

How To Streamline Compliance With NIS2 & DORA 

Managed Detection & Response: A proactive approach that enables organisations to meet the demands of NIS2 & DORA effectively. By Notis Iliopoulos

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.